My Account Log in

1 option

Security and Privacy in New Computing Environments : 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings / edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Shi, Wenbo., Editor.
Chen, Xiaofeng, Editor.
Choo, Kim-Kwang Raymond, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering 1867-822X ; 423
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-822X ; 423
Language:
English
Subjects (All):
Computer networks.
Data protection.
Application software.
Artificial intelligence.
Computer Communication Networks.
Data and Information Security.
Computer and Information Systems Applications.
Artificial Intelligence.
Local Subjects:
Computer Communication Networks.
Data and Information Security.
Computer and Information Systems Applications.
Artificial Intelligence.
Physical Description:
1 online resource (XIII, 396 pages) : 134 illustrations, 86 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was "Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management".
Contents:
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design
Fairness Protection Method of Vickery Auction Based on Smart Contract
An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network
Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol
An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection
A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT
SAD: Website Fingerprint Defense based on Adversarial Examples
A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD
Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy
ource code vulnerability detection method with multidimensional representation
A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things
RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient
Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control
Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption
BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT
Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
Threat Detection-Oriented Network Security Situation Assessment Method
System Business Affecting Impact Analysis Method with Crossover Probability Theory
RAP: A Lightweight Application Layer Defense against Website Fingerprinting
FL-iotDP: Differential Private Federated Neural Network
Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing
Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack
Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning
GLV/GLS Scalar Multiplication on Twisted Edwards Curves
Online Privacy of Personal Information - Perceptions v Reality
ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan
CAFM: Precise Classication for Android Family Malware.
Other Format:
Printed edition:
ISBN:
978-3-030-96791-8
9783030967918
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account